Computer Science ›› 2007, Vol. 34 ›› Issue (5): 66-71.
Previous Articles Next Articles
Online:
Published:
Abstract: Existing anomaly intrusion detection algorithms based on machine learning are usually founded on the equivalent learning of all historical dataset. Therefore, the learned network behavior profiles depend on the historical data heavily, thus behavior chara
Key words: Intrusion detection,Data stream process,Clustering analysis
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I5/66
Cited